1. Start going through the steps described in the document to encrypt this message.
2. These individual steps must be documented in full detail. Remember that you are doing this to get the feel and the experience of actually going through a symmetric encryption technique, so thoroughness is important here.
3. Once you succeed in encrypting the message, go back and decrypt it and verify that your cipher text is indeed resolvable into the original plaintext.
4. Prepare a detailed lab report documenting all the steps, with captions detailing what each step represents.
5. Plan on spending a few hours on this educational venture.
10-bit encryption key 00110 11101
8-bit encryption key 0100 1010